Facebook with Latestnigeriannews  Twieet with latestnigeriannews  RSS Page Feed
Home  |  All Headlines  |  Punch  |  Thisday  |  Daily Sun  |  Vanguard   |  Guardian  |  The Nation  |  Daily Times  |  Daily Trust  |  Daily Independent
World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  More Channels...

Viewing Mode:

Archive:

  1.     Tool Tips    
  2.    Collapsible   
  3.    Collapsed     
Click to view all Entertainment headlines today

Click to view all Sports headlines today

New Snowden documents prove the hacked NSA files are real

Published by Business Insider on Sat, 20 Aug 2016


Newly released documents from former US National Security Agency contractor Edward Snowden confirm what many experts had already believed: The 234-megabyte archive of NSA hacker tools, exploits, and implants that leaked online earlier this week is real.The key to confirming the leaked files, which was uploaded to various file-sharing sites earlier this week by a group called the "Shadow Brokers,"came in a top-secret agency manual published on Friday by Sam Biddle of The Intercept. It instructed NSA hackers on how to track their malicious software by using a 16-character string buried in the code.The tracking string in the manual, ace02468bdf13579, also appears inside code for a software implant called "Second Date," which was leaked as part ofthe archive posted earlierthis week.But that's not the only piece of evidence that shows the leak was, in essence,a software "toolbox" for NSA hackers to target adversaries. Among other files in the archive are implants code-named Banana Glee, Jet Plow, and Zesty Leak, which were alldocumented in a top-secret 50-page catalog of NSA tools that was published in late 2013."One of the interesting things about the exploits is they are very professional and they clean up after themselves," Dave Aitel, an ex-NSA research scientist who now leads penetration-testing firm Immunity, told Business Insider. "Not only do they turn things off, but they turn things back on. When you're looking at stuff that's written by a lot of hackers, it will backdoor something but it won't 'un-backdoor' something."Put simply: Your average hacker willbuild tools that break in, but a sophisticated hackersuch as those employed by the USor some other nationwill build tools that break in, hide all their tracks, and turn everything off once they get what they need."These are the type of tools that are really exclusive to governments," a source who worked for NSA's elite hacker unit, Tailored Access Operations, told Business Insider on condition of anonymity in order to discuss sensitive matters.Now that the NSA toolkit has been confirmed as legitimate, the remaining mystery ishow they came into public view. There are now two prevailing theories as to how the Shadow Brokers obtained the files: Either they hacked a server used by NSA hackers to stage attacks that had the files mistakenly left there by an operator, oran agency insider downloaded the data and later leaked it online.Both scenarios are plausible, though neither has been confirmed, and the NSA isn't likely to say anything.The previously-unknown Shadow Brokers created a number of social-media accounts earlier this month on Reddit, Github, Twitter, and Imgur before announcing on August 13 that its "cyber weapon auction," which promised bidders a "full state sponsor tool set" from a hacking unit believed to be within the NSA known only as "The Equation Group."It released a 234-megabyte archive on various file-sharing sites with half being free to view and use,while the other half was encrypted. The winner of the auction, the group said, would get the decryption key.But an auction for hacking tools and exploits is not something that ever happens, experts say. Instead, exploits are bought and sold on the black market for hundreds of thousands and sometimes millions of dollars in private.The NSA did not immediately respond to a request for comment.SEE ALSO:Experts have 2 theories for how top-secret NSA data was stolen, and they're equally disturbingJoin the conversation about this storyNOW WATCH: MITCH McCONNELL: Snowden 'did not perform a public service, he was a traitor
Click here to read full news..

All Channels Nigerian Dailies: Punch  |  Vanguard   |  The Nation  |  Thisday  |  Daily Sun  |  Guardian  |  Daily Times  |  Daily Trust  |  Daily Independent  |   The Herald  |  Tribune  |  Leadership  |  National Mirror  |  BusinessDay  |  New Telegraph  |  Peoples Daily  |  Blueprint  |  Nigerian Pilot  |  Sahara Reporters  |  Premium Times  |  The Cable  |  PM News  |  APO Africa Newsroom

Categories Today: World  |  Sports  |  Technology  |  Entertainment  |  Business  |  Politics  |  Columns  |  All Headlines Today

Entertainment (Local): Linda Ikeji  |  Bella Naija  |  Tori  |  Pulse  |  The NET  |  DailyPost  |  Information Nigeria  |  Gistlover  |  Lailas Blog  |  Miss Petite  |  Olufamous  |  Stella Dimoko Korkus Blog  |  Ynaija  |  All Entertainment News Today

Entertainment (World): TMZ  |  Daily Mail  |  Huffington Post

Sports: Goal  |  African Football  |  Bleacher Report  |  FTBpro  |  Kickoff  |  All Sports Headlines Today

Business & Finance: Nairametrics  |  Nigerian Tenders  |  Business Insider  |  Forbes  |  Entrepreneur  |  The Economist  |  BusinessTech  |  Financial Watch  |  BusinessDay  |  All Business News Headlines Today

Technology (Local): Techpoint  |  TechMoran  |  TechCity  |  Innovation Village  |  IT News Africa  |  Technology Times  |  Technext  |  Techcabal  |  All Technology News Headlines Today

Technology (World): Techcrunch  |  Techmeme  |  Slashdot  |  Wired  |  Hackers News  |  Engadget  |  Pocket Lint  |  The Verge

International Networks:   |  CNN  |  BBC  |  Al Jazeera  |  Yahoo

Forum:   |  Nairaland  |  Naij

Other Links: Home   |  Nigerian Jobs